
The Proxy Warfare: Unmasking Russia’s Externalized Cyber Capabilities
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks,
Donald Trump’s second term as the 47th President will influence US cybersecurity policy and the global threat landscape. QuoIntelligence explores
The 2024 US presidential election is a key event in global geopolitics, with Russia, China, Iran, and North Korea all
QuoIntelligence dives into the activities of the Russian disinformation network Doppelgänger on X throughout the French Parliamentary elections.
Try searching our blog
F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker
LockBit, DragonForce, and Qilin Forge Alliance to Amplify Global Ransomware Operations | Israel and Hamas Signed Off On First Phase of Gaza Deal
New Klopatra Android Banking Trojan Targets The Financial Sector Across Spain And Italy | Yemen’s Houthis Attack Dutch-flagged Ship In Gulf Of Aden
IRGC-aligned APT Targets Defense, Telecom, and Aviation Sectors across Western Europe | Italy Becomes First EU Member State To Adopt National Artificial Intelligence Law